In May 2018, explaining why the intelligence community objected to revealing the name of an FBI informant who talked with several Trump campaign officials in order to explore the extent of their ties with Russian intelligence operatives, FBI director Christopher Wray said: “The day that we can’t protect human sources is the day the American people start becoming less safe.” High-level U.S. officials say that the United States knows less in 2018 than it did in 2016 about Russia’s planned and executed attacks on U.S. democracy and infrastructure – and one reason is that Russian informants have gone silent. Current and former officials said the expulsion of American intelligence officers from Moscow has hurt collection efforts — but they also raised the possibility that the outing of an FBI informant under scrutiny by the House intelligence committee — an examination encouraged by President Trump — has had a chilling effect on intelligence collection.

A new form of misinformation is poised to spread through online communities as the 2018 midterm election campaigns heat up. Called “deepfakes” after the pseudonymous online account that popularized the technique – which may have chosen its name because the process uses a technical method called “deep learning” – these fake videos look very realistic. Because these techniques are so new, people are having trouble telling the difference between real videos and the deepfake videos. My work with colleagues has found a way to reliably tell real videos from deepfake videos. It’s not a permanent solution, because technology will improve. But it’s a start, and offers hope that computers will be able to help people tell truth from fiction.

The Election Assistance Commission, the government agency charged with distributing federal funds to support elections, released a report Tuesday detailing how each state plans to spend a total of $380 million in grants allocated to improve and secure their election systems. But even as intelligence officials warn of foreign interference in the midterm election, much of the money is not expected to be spent before Election Day. The EAC expects states to spend their allotted money within two to three years and gives them until 2023 to finish spending it.

If the weak response of the Obama White House indicated to America’s adversaries that the U.S. government would not respond forcefully, then the subsequent actions of House Republicans and President Trump have signaled that our adversaries can expect powerful elected officials to help a hostile foreign power cover up attacks against their domestic opposition. The bizarre behavior of the chairman of the House Permanent Select Committee on Intelligence, Rep. Devin Nunes, has destroyed that body’s ability to come to any credible consensus, and the relative comity of the Senate Select Committee on Intelligence has not yet produced the detailed analysis and recommendations our country needs. Republican efforts to downplay Russia’s role constitute a dangerous gamble: It is highly unlikely that future election meddling will continue to have such an unbalanced and positive impact for the GOP.

Social media bots and Russian trolls promoted discord and spread false information about vaccines on Twitter, according to new research. Using tactics similar to those at work during the 2016 United States presidential election, these Twitter accounts entered into vaccine debates months before election season was underway.

Celebrities, social media stars, and other online personalities have taken a hit to their credibility in recent months, as millions of their followers have been exposed as fake or bought. This has created a bigger problem for advertisers and consumers, who no longer can trust in high follower numbers as a measure of influence and credibility.

Microsoft says it has uncovered new Russian hacking attempts to target U.S. political groups ahead of the U.S. midterm elections in November. The company said a hacking group linked to Russia’s government had created fake Internet domains in order to mimic the websites of two conservative Washington-based think tanks that have been critical of the Kremlin — the Hudson Institute and the International Republican Institute. It said the Russian hackers also created three fake domains designed to look as if they belonged to the U.S. Senate.

The Senate is working on a bill to secure election infrastructure against cybersecurity threats, but, unless amended, it will widely miss the mark. The current text of the Secure Elections Act omits the two most effective measures that could secure our elections: paper records and automatic risk limiting audits.

In July, the Wall Street Journal reported that in 2016 and 2017, hackers backed by the Russian government successfully penetrated the U.S. electric grid through hundreds of power companies and third-party vendors. Russian hackers gained access to control rooms, putting them in a position to disrupt U.S. power flow.

Researchers have uncovered Foreshadow, a new variant of the hardware vulnerability Meltdown announced earlier in the year, that can be exploited to bypass Intel Processors’ secure regions to access memory and data. The vulnerability affects Intel’s Software Guard Extension (SGX) technology, a new feature in modern Intel CPUs which allows computers to protect users’ data in a secure ‘fortress’ even if the entire system falls under an attacker’s control.

A novel encryption method devised by MIT researchers secures data used in online neural networks, without dramatically slowing their runtimes. This approach, a combination based on two encryption techniques, holds promise for using cloud-based neural networks for medical-image analysis and other applications that use sensitive data.

Today, the expeditious delivery of electronic documents, messages, and other data is relied on for everything from communications to navigation. As the near instantaneous exchange of information has increased in volume, so has the variety of electronic data formats–from images and videos to text and maps. Verifying the trustworthiness and provenance of this mountain of electronic information is an exceedingly difficult task – especially since the software used to process electronic data is error-prone and vulnerable to exploitation through maliciously crafted data inputs, opening the technology and its underlying systems to compromise.

Political scientists who study election mechanics — — campaign finance, what polling data have to do with voting, how different population groups vote, how effective political advertisements are — are yet to come to grips with the role Russian government agents played in the 2016 election. Clark University political scientists Robert Boatright writes that “We don’t have the ability to track exactly what went on over Twitter or Facebook in the election, which accounts were real and which were fake. And … we may not regain the sort of transparency that enabled us to study elections with the precision we once did. We don’t really have any precedent for studying what a foreign government might do to influence an American campaign in this way because it hasn’t been done before in the United States. Maybe we’ll get there in a few years, but for now, all we know is that our research is more likely than usual to be incomplete.”

DEFCON, the world’s largest hacking convention, took place in Las Vegas over the weekend. Emmett Brewer, one of about 40 children between the ages of 8 and 16 who were taking part in the event, took less than 10 minutes to hack into a replica of Florida’s election reporting website. An 11-year old girl also managed to break into the site, tripling the number of votes for one of the candidates. Several 8-year old kids managed to tamper with vote tallies and change candidates’ names.

The long view

Bombs exploding, hostages taken and masked gunmen firing machine guns are all types of terrorist attacks we’ve seen. According to a new study, it’s the attacks we don’t see – cyberattacks – that happen more often and can cause greater destruction. “Little work has been done around the use of the internet as an attack space,” said Thomas Holt, Michigan State University professor of criminal justice and lead author. “The bottom line is that these attacks are happening and they’re overlooked. If we don’t get a handle understanding them now, we won’t fully understand the scope of the threats today and how to prevent larger mobilization efforts in the future.”

A new RAND report examines current Russian hostile measures in Europe and forecasts how Russia might threaten Europe using these measures over the next few years. “Whatever the U.S. response, preparation for involvement in a wide range of conflicts can help reduce the risk of mismanagement, miscalculation, and escalation,” the report’s authos say.

As the volume of digital information in corporate networks continues to grow, so grows the number of cyberattacks, and their cost. One cybersecurity vendor, Juniper Networks, estimates that the cost of data breaches worldwide will reach $2.1 trillion in 2019, roughly four times the cost of breaches in 2015. Now, computer scientists have developed a tool that could make it harder for hackers to find their way into networks where they don’t belong.

With almost every online purchase, a person’s personal information — name, date of birth and credit card number — is stored electronically often in the “cloud,” which is a network of internet servers. Now, as more people buy from online businesses, researchers hope to employ a new strategy in the ongoing struggle to protect digital information in the cloud from targeted cyberattacks. The strategy establishes a new artificial intelligence system to combat digital intrusions.

The most basic type of quantum information processing is quantum entanglement. In a new study, researchers have provided a much finer characterization of the distributions of entanglement in multi-qubit systems than previously available. These findings can be used in quantum cryptography to estimate the quantity of information an eavesdropper can capture regarding the secret encryption key.